Understand China's cyberwarfare

21st Century Chinese Cyberwarfare presents the salient information regarding the use of cyberwarfare doctrine by the People's Republic of China to promote its own interests and enforce its will on other nations, and draws from a combination of business, cultural, historical and linguistic sources, as well as the author's personal experience, to attempt to explain China to the uninitiated. The author argues that the threat of Chinese cyberwarfare can no longer be ignored, that it is a clear and present danger to organisations of all shapes and sizes, and that it will be economically, societally and culturally damaging for the nations that are targeted.

Product overview

Those that will benefit from the book include: law enforcement agencies; international information security professionals; IT professionals; military professionals; government policy makers and corporate managers. In particular, the book discusses:

About the author

Lieutenant Colonel William Hagestad is recognised internationally as an expert on the Chinese People's Liberation Army and government information warfare. He advises international intelligence organisations, military flag officers, and multi-national commercial enterprises on their internal IT security governance and external security policies. He currently speaks both domestically and internationally on the Chinese cyber threat.

Buy today, in any format. We’ll send you a download link right away, or dispatch today for swift delivery to your selected destination.

To me, the book is a cross between a military text book and an IT Security book. The military part of the book covers Chinese military doctrine for conducting cyber operations, placing the Chinese method of conducting a virtual offensive soundly on a theoretical basis. It suggests Chinese principles of war, but in the cyberwarfare areana. It supports analysis with a detailed breakdown of the Chinese organisation / structures for conducting cyber operations, showing how the People's Liberation army, is supported by State Owned Enterprises and state sponsored hackers. The book is well worth reading for those interested in IT Security set in its wider importance.Was this comment helpful?
yesno
(0 people found this comment helpful, 0 did not)